CSCI6268L03 - Foundations of Network and Computer Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Foundations of Network and Foundations of Network and Computer Security Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Quiz #1 Friday A week from today, Sep 4 th Covers reading and lectures up to Weds Sep 2 nd In class, 50mins, closed notes, no calculators
Background image of page 2
Exhaustive Key-search We had 403291461126605635584000000 possible keys Keysize is lg of this, or about 88.4 bits Infeasible to exhaustively search even with a lot of money and resources! Rule of Thumb 2 30 quite easily 2 40 takes a while, but doable (exportable keysize!) 2 50 special hardware, parallelism important 2 60 only large government organizations 2 70 approaching the (current) limits of imagination
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
So Substitution Cipher is Secure? Nope Ever do the Sunday Cryptograms? Attacks: Frequency analysis etaoinshrdlu… Diphthongs, triphthongs ST, TH, not QX Word lengths A and I are only 1-letter words Other statistical measures Index of Coincidence
Background image of page 4
What did we just Implicitly Assume? What assumption was made in these attacks? What was a central feature of the Substitution Cipher which permitted these attacks? (hard) How can we repair these problems?
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Ok, we had a blocksize of < 5 bits So fix it! Try 64 bits instead All is well? How many permutations are there now? 2 64 ! ≈ 2 2 70 Stirling’s formula: What is the keysize (in bits)? About 2
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/11/2010 for the course CSCI 6268 taught by Professor Black during the Winter '09 term at University of Colombo.

Page1 / 19

CSCI6268L03 - Foundations of Network and Computer Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online